US7346778B1 - Security method and apparatus for controlling the data exchange on handheld computers - Google Patents
Security method and apparatus for controlling the data exchange on handheld computers Download PDFInfo
- Publication number
- US7346778B1 US7346778B1 US09/726,822 US72682200A US7346778B1 US 7346778 B1 US7346778 B1 US 7346778B1 US 72682200 A US72682200 A US 72682200A US 7346778 B1 US7346778 B1 US 7346778B1
- Authority
- US
- United States
- Prior art keywords
- communication
- portable computer
- identity
- identification
- recited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
Definitions
- the present invention relates to the field of portable devices such as handheld palmtop computer systems or personal digital assistants. Specifically, the present invention relates to a method and apparatus for securely controlling the data exchange on handheld computers.
- a portable computer system such as a palmtop computer may include a hand held device and an interface device.
- the hand held portable device may be the actual portable computer device.
- the interface device may provide the docking mechanism to which the portable computer device ports and which then connects to the portable computer device and synchronizes it to other computers to allow the computers to communicate and exchange data.
- An example of such an interface device is a palmtop computer system cradle device.
- portable computers such as the palm top computers
- they may be brought anywhere by anyone to port with another computer, such as a desk top personal computer, docked via a compatible interface such as a palmtop computer system cradle device then presently connected to the desktop computer, synchronized with the other computer via the interface device, and used to access data therefrom by data transfer.
- another computer such as a desk top personal computer
- a compatible interface such as a palmtop computer system cradle device
- a lack of security may result with the synchronization mechanism. This can result because anyone, not just the owner of certain data or a designated, authorized user of such data, may be able to access these data stored on a portable computer, or use a portable computer to access the data stored on another computer such as a desktop personal computer by synchronizing the portable computer to the desktop computer through a compatible portable computer system interface device, such as palmtop computer system cradle device then presently connected to the computer at the desktop station. Further, even authorized data users may access the data in an unauthorized manner using a portable computer. These are especially serious problems given the small size, portability, and concealability of portable computers, coupled with their significant data storage and communication capabilities.
- the owner or authorized user may misplace a portable computer such as a palmtop device, or the portable computer may be misappropriated.
- a portable computer such as a palm top device belonging to someone else and containing data valuable to the owner and confidential in nature
- the unauthorized person may attempt to access the data contained therein.
- the unauthorized person may attempt this by taking the inadvertently misplaced or wrongfully acquired palm top device to a desktop station to which he or she has access where a computer is connected to a compatible cradle device, docking the palm device to the cradle device, synchronizing the computers via the cradle device, and downloading the data stored on the palm device to the desktop computer.
- a person possessing a portable computer such as a palm top device of their own may attempt to access sensitive valuable data from a desktop computer then presently connected to a compatible cradle device without authority to do so by taking their own palmtop device to the unauthorized desktop computer, docking their palm device to the cradle device then there connected, synchronizing the computers, and downloading the unauthorized, sensitive data.
- Another example could involve persons normally authorized to access sensitive valuable data in certain specific, limited manners, such as data transactions on specified desktop computers during normal business hours under supervision.
- persons may use their own concealed portable computers to access and copy such data after hours or when supervisory attention is diverted, for later unauthorized, unsupervised access or later transfer to other, unauthorized computers, elsewhere.
- data thus stored may be sensitive, confidential, valuable, and possibly irreplaceable.
- the unauthorized acquisition of such data by persons other than the owner or persons authorized by the owner, or use in unauthorized ways by persons who may under other circumstances be authorized can be damaging. Consequently, it is desirable to discourage synchronization of portable computers such as palmtop devices to other, unauthorized computers such as desktop or laptop computers, or other data transfer, storage, or communication systems, via compatible interfaces, such as palm top computer system cradle devices.
- portable computers such as palmtop devices may be considered valuable, easy to appropriate and conceal, and thus plausible items for theft.
- the data a particular portable computer may contain may be even more valuable, and hence a more plausible target for a thief aware of this content and its value.
- passwords can be defeated by unauthorized users, especially by persons determined to gain unauthorized access to valuable, sensitive, password protected data.
- passwords may be easily suppressed or bypassed by authorized users, often are, and correspondingly may not provide the protection they were designed to provide. It is also sometimes possible for knowledgeable unauthorized users to bypass or suppress passwords, rendering data totally unprotected. Persons aware of the nature and value of, and willing to attempt unauthorized access to particular data may be especially so capable. Thus, password protection may not provide a sufficient level of security for valuable, sensitive data.
- passwords have proven annoying and inconvenient, in addition to not providing adequate protection.
- the invention can be applied to any computer having the capability to transfer data, but in one embodiment a portable computer is described herein.
- Authorization is enabled by an interface permitting synchronization of the portable computer with a host computer by authentication of the particular portable computer identity. For instance, in one embodiment, when a portable computer is docked with a compatible interface connected to a host desktop computer, it is identified by the interface through contacts or contact free sensing. If the particular portable computer identity is authenticated as one authorized to communicate with that desktop, then synchronization of the portable computer with the desktop for communication will be enabled by the interface. The portable computer may then communicate with the desktop and transfer data.
- the portable computer identity is not one which is authorized for communication with the desktop, then authentication will not occur, synchronization will correspondingly be disabled by the interface, and communication between the portable computer and the desktop will be prevented.
- Various systems can be used to enable the identity authentication.
- a contact free magnetic key is used.
- the identifying system also encrypts all data transferred to a key value specific to the unique identity, such that unauthorized external applications are forbidden from access to the data.
- an identifying tagging mechanism is added to the internals the portable computer device, and a compatible reader mechanism is added to the opposite interface device.
- the reader mechanism contains a list of tagging mechanism identities acceptable to it, and authorizes synchronization only to devices with acceptable identities, and prevents synchronization with devices with unacceptable identities.
- a tagging mechanism is in a palmtop device and a tag reader mechanism is in a cradle device.
- the interface device contains the identifying tag, and the reader mechanism will be in the portable computer device. This will allow a single portable computer device to access an authorized network or group of cradles.
- Another embodiment relies on encryption, wherein the synchronized data is encrypted with a specific key value from the identifying tag component to forbid accessing the synchronized data from an external application.
- the tag/reader communication between the portable computer device and the interface device occurs electrically through compatible contacts on each device.
- the tag/reader communication is established without direct electrical contact through magnetic, infrared or other electromagnetic emissions from one device, such as a palmtop computer device, being sensed and read by the other device, such as a cradle device.
- Other embodiments apply combinations of these mechanisms.
- FIG. 1 depicts a typical palm top portable computer system, as in one embodiment of the present invention.
- FIG. 2 is a top side perspective view of a portable palm top computer system, in accordance with one embodiment of the present invention.
- FIG. 3 is a bottom side perspective view of the portable palm top computer system of FIG. 2 .
- FIG. 4 depicts a perspective view of the cradle device for connecting the portable palm device to other systems, such as a desktop computer system via a communication interface in accordance with one embodiment of the present invention.
- FIG. 5 is an exploded view of the components of the portable palm top computer system of FIG. 2 .
- FIG. 6 is a block diagram of a portable computer system in accordance with one embodiment of the present invention.
- FIG. 7 is a block diagram of interrelationships possible via a portable computer system docking cradle device between a portable computer system and a network including a desktop or laptop computer system and connection to an external application, in accordance with one embodiment the invention.
- FIG. 8 depicts a simple communication interface between a portable computer system palm device via a portable computer system cradle device with a desktop PC, in accordance with one embodiment of the present invention.
- FIG. 9A depicts a palm device contact free identity authentication interaction between a magnetic security key in a palm device and a magnetic security key reader in a cradle device, in accordance with one embodiment of the present invention.
- FIG. 9B depicts a system in which smart cards and compatible readers installed in a palm device, a cradle device, and in both serve as an identification authentication mechanism in several embodiments of the present invention.
- FIG. 9C depicts a system incorporating contact free communication of identification authentication information in accordance with several implementations of the present invention.
- FIG. 10 illustrates an exemplary system of security assemblies within a portable computer system cradle device and enabling smart card components in both the cradle device and a palm device, in accordance with one embodiment of the present invention.
- FIG. 11 illustrates an exemplary system permitting encryption and communication of data from a key authenticated palm device by security assemblies within a cradle device, in accordance with one embodiment of the present invention.
- FIG. 12 is a flow chart depicting a the portable computer system palm device identity authentication process between a palm device and compatible cradle device, in accordance with one embodiment of the present invention.
- the present invention is discussed primarily in the context of a portable computer system, such as a palmtop or personal digital assistant, with the capability to access data on other computers through connection via compatible interfaces, such as cradle devices.
- a portable computer system such as a palmtop or personal digital assistant
- compatible interfaces such as cradle devices
- the present invention can be used with other types of devices that have the capability to access some type of central device or central site, including but not limited to desktop and laptop computer systems.
- FIG. 1 An exemplary portable palm top computer 100 which may incorporate an embodiment of the present invention is depicted in FIG. 1 .
- Palm top computer 100 is small enough to fit in the palm of a user's hand. It is correspondingly lightweight, thin, and conveniently portable. Hence, it is eminently concealable. Notwithstanding this diminutive structure, exemplary portable palm top computer 100 contains a memory unit of relatively sizable capacity, a processor, and significant interface, communications, and data transfer capabilities facilitated by internal components not shown. These and other operative components of exemplary palm top computer 100 may be contained within an enveloping tough plastic body structure 208 with attached, hingeably closing cover structure 209 which may be closed over the face of body structure 101 so as to protect various externally accessible components of the computer.
- Such components may include a display screen 105 , which in some embodiments may be capable of providing user interaction capabilities such as alphanumeric and command input, and stylus enabled on screen writing, and control devices 106 .
- a power switch 207 may be mounted in some embodiments as depicted on an accessible edge of body structure 101 .
- FIG. 2 is a perspective illustration of the top face 100 a of a one palmtop computer.
- the top face 100 a contains a display screen 105 surrounded by a bezel or cover.
- a removable stylus 80 is also shown.
- the display screen 105 is a touch screen able to register contact between the screen and the tip of the stylus 80 .
- the stylus 80 can be of any material to make contact with the screen 105 .
- the top face 100 a also contains one or more dedicated and/or programmable buttons 75 for selecting information and causing the computer system to implement functions.
- the power button 207 is also shown.
- FIG. 2 also illustrates a handwriting recognition pad or “digitizer” containing two regions 106 a and 106 b .
- Region 106 a is for the drawing of alphabetic characters therein (and not for numeric characters) for automatic recognition
- region 106 b is for the drawing of numeric characters therein (and not for alphabetic characters) for automatic recognition.
- the stylus 80 is used for stroking a character within one of the regions 106 a and 106 b .
- the stroke information is then fed to an internal processor for automatic character recognition. Once characters are recognized, they are typically displayed on the screen 105 for verification and/or modification.
- FIG. 3 illustrates the bottom side 100 b of a palmtop computer system.
- An extendible antenna 85 is shown, and also a battery storage compartment door 90 is shown.
- a communication interface 180 is also shown.
- the communication interface 180 is a serial communication port, but could also alternatively be of any of a number of well-known communication standards and protocols, e.g., parallel, SCSI (small computer system interface), Firewire (IEEE 1394), Ethernet, etc.
- identification authentication information may flow over contacts in communication interface 180 .
- FIG. 4 is a perspective illustration of one embodiment of the cradle 60 for receiving the palmtop computer system 100 .
- Cradle 60 contains a mechanical and electrical interface 181 for interfacing with communication interface 180 ( FIG. 3 ) of computer system 100 when system 100 is slid into the cradle 60 in an upright position.
- button 270 can be pressed to initiate two-way communication (e.g., a communication session) between computer system 100 and other computer systems coupled to communication interface 180 .
- communication between the palmtop computer system 100 and other computer systems flows through interface 181 , connectors internal ( FIG. 10 ) to cradle unit 60 , and communication cable 182 .
- an identity authentication reader is housed within cradle device 60 ( FIG. 9A ) to sense identity authentication signals from an identifying authenticating signal sending component ( 701 ) within portable computer devices ( FIGS. 5 , 9 A).
- the reader is a magnetic key reader, and the corresponding identity authentication is performed without contacts.
- the reader is a smart card reader.
- identification authentication information flows from palm top device 100 through contacts in interface 180 on the palmtop device ( FIG. 3) and 181 on cradle device 60 ( FIG. 4 ), to a hard-wired sensing component within cradle device 60 ( FIG. 10 ).
- Alternative embodiments of the present invention place an identification authentication tagging component within cradle device 60 and an identification sensing reader component within the palmtop device 100 .
- FIG. 5 is an exploded view of the palmtop computer system 100 .
- Computer system 100 contains a back cover 245 , and a front cover 210 having an outline of region 106 and holes 75 a for receiving buttons 75 b .
- a flat panel display 105 fits into front cover 210 .
- the flat panel display unit 105 in one embodiment is a liquid crystal display (LCD).
- a rechargeable battery 215 provides electrical power.
- a manual contrast adjusting potentiometer 220 is also shown, as well as a power switch 95 .
- a flex circuit 230 is shown along with a printed circuit (PC) board 225 containing electronics and logic (e.g., memory, communication bus, processor, etc.) for implementing computer system functionality.
- the digitizer pad is also included in PC board 225 .
- PC printed circuit
- a midframe 235 is shown along with stylus 80 .
- Position-adjustable antenna 85 is shown.
- Infrared communication mechanism 64 e.g., an infrared emitter and detector device
- a signal e.g., radio
- the receiver/transmitter device 108 is coupled to the antenna 85 and also coupled to communicate with the PC board 225 .
- midframe 235 bears a retaining recess 702 , configured to mount and retain magnetic key 701 .
- retaining recess 702 may mount and retain magnetic key reader mechanism 701 ( a ).
- component 701 may be another tag mechanism and 701 ( a ) another reader mechanism. In any of these particular embodiments, when palm top device 100 is slid into cradle device 60 ( FIG. 4 ) in an upright position the reader mechanism senses and reads the corresponding opposite component, affecting contact free identification authentication.
- contact free identification authentication information may be sent by the palmtop device via infrared communication mechanism 64 to a corresponding infrared communication mechanism in an interface device. In another embodiment, contact free identification authentication information may be sent by the palmtop device via transmitter/receiver component 108 to a corresponding receiver/transmitter component in an interface device.
- identification authentication information may be transmitted over a combination of the aforementioned contact free vehicles, such as magnetic key (or other tagging mechanisms) 701 and infrared communication mechanism 64 , magnetic key (or other tagging mechanisms) 701 and transmitter/receiver 108 , and combining of all three aforementioned contact free vehicles, as well as other possible contact free vehicles.
- the invention may be implemented combining any combination or all possible combinations of contact free identification authentication vehicles with communication over electrical contacts to/from hardwired identifying tagging/reading mechanisms in corresponding devices.
- Another possible implementation could include identification authentication to communication via electrical contacts between hardwired identifying tagging/reading mechanisms in corresponding devices.
- FIG. 6 illustrates circuitry of computer system 100 , some of which can be implemented on PC board 225 ( FIG. 5 ).
- Computer system 100 includes an address/data bus 110 for communicating information, a central processor 101 coupled with the bus for processing information and instructions, a volatile memory 102 (e.g., random access memory, RAM) coupled with the bus 110 for storing information and instructions for the central processor 101 and a non-volatile memory 103 (e.g., read only memory, ROM) coupled with the bus 110 for storing static information and instructions for the processor 101 .
- Computer system 100 also includes an optional data storage device 104 (e.g., memory stick) coupled with the bus 110 for storing information and instructions. Device 104 can be removable.
- Computer system 100 also contains a display device 105 coupled to the bus 110 for displaying information to the computer user.
- PC board 225 can contain the processor 101 , the bus 110 , the ROM 103 and the RAM 102 .
- an identification authentication and synchronization enabling mechanism 150 can also be placed on PC board 225 .
- the identification authentication reader device may be placed on PC board 225 .
- the identification authentication sending device could be in the interface devices. Such an embodiment would enable a palm top device to synchronize with only certain interface devices with allowable identities.
- Another embodiment of the present invention may be a software based identification authentication scheme with which ROM 103 would be programmed.
- computer system 100 also includes a signal transmitter/receiver device 108 , which is coupled to bus 110 for providing a physical communication link between computer system 100 , and a network environment.
- signal transmitter/receiver device 108 enables central processor unit 101 to communicate wirelessly with other electronic systems coupled to the network.
- signal transmitter/receiver device 108 is coupled to antenna 85 ( FIG. 5 ) and provides the functionality to transmit and receive information over a wireless communication interface.
- the present embodiment of signal transmitter/receiver device 108 is well suited to be implemented in a wide variety of ways. For example, signal transmitter/receiver device 108 could be implemented as a modem.
- identification authentication may be communicated via transmitter/receiver device 108 to an interfacing device such as a cradle ( FIG. 4 ).
- Identification authentication and synchronization enablement capability may be incorporated into component 108 in one embodiment. In an alternative embodiment, such capability may be implemented through interaction between components 108 and 150 .
- computer system 100 includes a communication circuit 109 coupled to bus 110 .
- Communication circuit 109 includes an optional digital signal processor (DSP) 120 for processing data to be transmitted or data that are received via signal transmitter/receiver device 108 .
- DSP digital signal processor
- processor 101 can perform some or all of the functions performed by DSP 120 .
- Identification authentication capability may reside in communication circuit 109 in one embodiment of the present invention. In another embodiment, identification authentication capability may be a function of software.
- a program within ROM 103 would direct operations of processor 101 to send identifying information via transmitter/receiver device 108 .
- processor 101 may execute a program stored in ROM 103 to respond to identification authentication information from the interface device such as a cradle ( FIG. 4 ).
- an optional alphanumeric input device 106 that in one implementation is a handwriting recognition pad (“digitizer”) having regions 106 a and 106 b ( FIG. 2 ), for instance.
- Alphanumeric input device 106 can communicate information and command selections to processor 101 .
- Computer system 100 also includes an optional cursor control or directing device (on-screen cursor control 107 ) coupled to bus 110 for communicating user input information and command selections to processor 101 .
- on-screen cursor control device 107 is a touch screen device incorporated with display device 105 .
- On-screen cursor control device 107 is capable of registering a position on display device 105 where the stylus makes contact.
- the display device 105 utilized with computer system 100 may be a liquid crystal display device, a cathode ray tube (CRT), a field emission display device (also called a flat panel CRT) or other display device suitable for generating graphic images and alphanumeric characters recognizable to the user.
- Implementations of the present invention may include display of identification authentication and corresponding synchronization authorization and enablement, and of identification authentication refusal and corresponding synchronization prohibition and disablement.
- FIG. 7 depicts a block diagram of a system in which the palm top device may be connected, illustrating the potential for far reaching data transfer making security features implemented by embodiments of the present invention useful.
- System 51 includes portable computer 100 in accordance with one embodiment of the present invention.
- Portable computer system 100 is also known as a palmtop computer system or as a personal digital assistant (PDA).
- PDA personal digital assistant
- portable computer system 100 has the ability to transmit and receive data and information over a wireless communication interface (e.g., a radio interface).
- the wireless communication interface is integrated into portable computer system 100 ; in another embodiment, the wireless communication interface is accomplished with a wireless modem attachment 67 .
- FIG. 7 shows an embodiment of a system 51 for coupling a portable computer system 100 to other computer systems and to the Internet 52 in accordance with the present invention.
- System 51 is described in the context of wired connections between its various devices and components; however, it is appreciated that wireless connections (such as but not limited to Bluetooth wireless connections) can also be used, with access enabled or disabled as desired in accordance with the present invention.
- wireless connections such as but not limited to Bluetooth wireless connections
- system 51 comprises a host computer system 56 which can either be a desktop unit as shown, or, alternatively, can be a laptop system 58 .
- host computer systems can be used within system 51 .
- Host computer systems 58 and 56 are shown connected to a communication bus 54 such as an Ethernet Local Area Network (LAN), but which can instead be any of a number of other types.
- Bus 54 can provide communication with the Internet 52 using a number of well-known protocols.
- host computer system 56 is also coupled via connector cable 68 to a cradle 60 for receiving and initiating communication with portable computer system 100 (“handheld computer”) of the present invention.
- Connector cable 68 can be a serial bus (e.g., RS232), a parallel bus, a Universal Serial Bus (USB), or any other type of workable connection.
- Cradle 60 provides an electrical and mechanical communication interface between connector cable 68 and portable computer system 100 for two-way communications with host computer system 56 .
- Portable computer system 100 also contains a wireless infrared communication mechanism 64 for sending and receiving information from other devices.
- any such communications may be enabled or disabled as desired by the selection of identifying authentication mechanisms recognized as allowable or prohibited by an authentication reading mechanism on an interface unit such as cradle 60 , or in software within portable computer 100 or host system 56 or 58 , or both the portable and host systems.
- Coupled with Internet 52 are multiple servers exemplified by server 30 . Residing on server 30 is a Web site 40 . When communicating with a Web site over Internet 52 , protocols such as CTP (Compact Transport Protocol) and CML (Compact Markup Language) can be used by portable computer system 100 in the present embodiment.
- CTP Cosmetic Transport Protocol
- CML Compact Markup Language
- proxy server 36 one of the functions of proxy server 36 is to perform operations over the Internet 52 on behalf of portable computer system 100 .
- proxy server 36 has a particular Internet address and acts as a proxy device for portable computer system 100 over the Internet 52 .
- the data and information which are communicated between network 51 via cradle 60 and portable computer system 100 are the same type of information and data that can conventionally be transferred and received over a public telephone wire network system.
- a wireless communication system may be utilized to communicate data and information between portable computer system 100 and wireless communications systems. It should be appreciated that one embodiment of a wireless communication system in accordance with the present invention is the Mobitex wireless communication system.
- any such communications may be enabled/disabled in accordance with the present invention in accordance with identification authentication and corresponding authorization/prohibition of synchronization of portable computers for communications and data transfer with telephone systems, either wire networks or wireless.
- a wireless connection may be enabled/disabled between a certain portable computer system 100 containing an identification authentication mechanism allowing or prohibiting that system from accessing Internet 52 .
- control over synchronization of portable computers to other computers or communication systems through identification authentication may involve physical devices, such as magnetic keys and smart cards.
- synchronizing portable computer 100 to network 51 via cradle 60 may be enabled by identification authentication implemented by a magnetic key in computer 100 and magnetic key reader in cradle 60 , respectively.
- identification authentication may be more appropriately implemented using a software based protocol.
- FIG. 8 depicts a simple interconnection of a portable computer 100 , such as a palmtop device, connected to a desktop personal computer 103 through interface device 60 , which in one embodiment of the present invention may be a cradle device ( FIG. 4 ).
- the present invention may be implemented with identification authentication information contained in identifying tag key mechanisms 701 embedded within palmtop device 100 and a corresponding identification authentication reader device 702 embedded within interface device 60 .
- This arrangement allows for the interface device 60 , connected to another computer such as exemplary desktop computer 103 , but which could also be a laptop computer or some other data storage system or data communication system, to control the synchronization scenario by recognizing and correspondingly allowing identities of a single palmtop device or limited group of palm top units, and refusing identification authentication and correspondingly disallowing synchronization with all other palmtop devices.
- the invention may be implemented with identification authentication within an identifying tag key mechanism 701 embedded within a single interface unit or limited group of interface units ( 60 ) and an identification authentication reader mechanism 702 embedded within a palm top device or a certain limited group of such devices ( 100 ).
- This arrangement allows a particular palmtop device or limited group of palmtop devices ( 100 ) to access a single interface unit, or a limited group of interface units ( 60 ).
- This embodiment allows an added degree of flexibility in terms of which other computers a particular palm device, or a certain limited group of perhaps more securely controlled palm devices ( 100 ) may synchronize with.
- FIG. 9A depicts a system of portable computers with contact free security components installed as in one embodiment of the present invention.
- Palmtop device 100 incorporates identifying magnetic key 701 .
- Interface device 60 incorporates an identity authenticating magnetic key reader 702 that senses and reads information transmitted by magnetic key 701 .
- magnetic key reader 702 Upon authentication of the identity of palmtop device 100 as an authorized device, magnetic key reader 702 authorizes enablement of communication between palmtop device 100 and desktop computer 60 , which could also be a laptop computer, or any data storage or communication system.
- FIG. 9A may assign the converse functions to components 701 and 702 , such that identification reader 702 is embedded in palm top 101 , and identification authentication tag 701 is embedded within interface 102 .
- This arrangement allows a particular palm device or limited group of palm devices ( 100 ) to access a single interface unit, or a limited group of interface units ( 60 ).
- These embodiments allow an added degree of flexibility in terms of which other computers a particular palm device, or a certain limited group of perhaps more securely controlled palm devices ( 100 ) may synchronize with.
- FIG. 9B depicts an embodiment of the present invention in which smart cards, or equivalent identification tags enable key mechanisms 701 and 702 , and serve as identification authentication tag components.
- Smart card 114 inserted into a slot 114 ( a ) on palmtop device 100 triggers key mechanism 701 to signal reader mechanism 702 .
- smart card 114 must be inserted into slot 114 ( a ) for the identity of palmtop device 100 to be authenticated by cradle 60 .
- a smart card 114 with a correct, allowable identity encoded thereon is inserted into the slot 114 ( a ), it triggers key mechanism 701 to signal reader mechanism 702 to read the identity.
- the smart card identity is recognized by an identifying modality of reader mechanism 702 in cradle 60 , and the identity of palmtop 100 is authenticated. Cradle 60 will accordingly enable palmtop 100 to synchronize with desktop computer 103 , allowing data transfer. For any palm top without a smart card inserted, or with a smart card without a correct, allowable identification encoded thereon, identification authentication will not occur, synchronization will be disabled, and data transfer is correspondingly prohibited.
- smart card 115 is inserted into slot 115 ( a ) on cradle 60 and triggers reader mechanism 702 .
- smart card 115 must be inserted into slot 115 ( a ) for cradle 102 to allow identity sensing, reading, recognition and authentication of the identity of palmtop device 100 , or a certain limited group of similarly identified palmtops.
- smart card 115 must be inserted into slot 115 ( a ) for a palm top or certain limited group of palmtops equipped with identification reader mechanisms 702 to recognize a particular cradle 60 equipped with an identifying tag key mechanism.
- a smart card 115 with a correct, allowable identity encoded thereon when inserted into the slot 115 ( a ), it triggers key mechanism 701 to signal reader mechanism 702 and smart card identity is recognized by an identifying modality of reader mechanism 702 .
- the corresponding identity is authenticated.
- Cradle 60 will accordingly enable palmtop 100 to synchronize with desktop computer 103 , allowing data transfer.
- Cradle 60 without its smart card 115 inserted, will not allow any identification authentication. Thus, synchronization with any palmtops will be disabled, and data transfer is correspondingly prohibited. Placing the smart card within a cradle connected at a certain desktop station provides protection of that station from unauthorized synchronization with portable computers.
- any of the aforementioned embodiments using smart cards or equivalent identification tags may also be implemented using contact free interface mechanisms between palmtop 100 and cradle 60 .
- Contact free implementation may be accomplished via magnetic keys, as discussed above, infrared communication device 64 or transmitter/receiver 108 ( FIG. 5 ), or some mechanism of similar contact free capability.
- Smart cards or equivalent identification mechanisms allow a measure of flexibility in designating portable computers for authorized recognition by an interface unit such that they may synchronize via the interface with other computers connected. This flexibility includes the ability to control which smart cards are issued to which portable computer user under various circumstances.
- Other embodiments of the present invention are possible, including embedding an assigned identification within portable computers and interfaces at the factory, during manufacture and reworking, and flashing assigned, allowable identifications into portable computers and interfaces at user's own facilities. Such embodiments enable authorization levels of various identified portable computers to be fixed, or to be changed, as for example, as a user's security clearance changes.
- FIG. 10 depicts the interconnection of portable computer 100 , which may be a palmtop computer, with exemplary desktop computer 103 , which may also be a laptop computer or any data storage or communication system, via interface device 60 , which may be a cradle, but which may also be any compatible interface.
- identification authentication mechanisms include smart card 114 on portable computer 100 , and 115 on cradle 60 .
- Cradle 60 may also contain an authentication block 906 , which in one embodiment could be an application specific integrated circuit (ASIC). Also present in cradle 60 are key mechanism 703 and decryption mechanism 907 .
- ASIC application specific integrated circuit
- smart card 114 serves as an identification tagging mechanism for palmtop 100 , which is connected to cradle 60 through contacts 180 ( FIGS. 1 , 3 ) or any contact free mechanism.
- Smart card 115 provides a list of acceptable palmtop identities to authentication block 906 . If the identity of palmtop 100 is on the list of acceptable identities, authentication block 906 causes key mechanism 703 to allow palmtop 100 to synchronize with desktop 103 via the interface provided by cradle 60 . Communication thus enabled, data transfer between the computers is permitted.
- Data transmitted by palmtop 101 may be in an encrypted format.
- One embodiment of the present invention allows decryption by a deciphering block 907 within cradle 60 .
- authentication block 906 causes key 703 to allow synchronization and simultaneously engages deciphering block 907 to decrypt the data transmitted from palmtop 100 via cradle 60 to desktop 103 .
- Decryption is disabled if synchronization does not occur, providing an added layer of security for data on palmtop 100 . It should be appreciated that other decryption mechanisms may be utilized in alternative embodiments including software based methods.
- a list of authorized palmtop identities may be preprogrammed such that no user provided lists may be implemented. In certain applications, this may be preferable as providing an additional layer of security, for example, from an unauthorized user who somehow acquires a smart card access authority list that could be used to initiate synchronization of a desktop with an unauthorized palmtop.
- FIG. 11 depicts exemplary palmtop 100 , identified by smart card 114 and connected to exemplary cradle 60 .
- Authentication block 906 which in one embodiment may be an ASIC containing a preprogrammed list of acceptable palmtop identities, recognizes the identity of palmtop 100 .
- Such a preprogrammed identity acceptability list may be installed at the factory during manufacture or rework. Programmability is possible in some embodiments by enabling changes to the list of programmed acceptable identities by flashing at a user's facility. If palmtop 100 lacks a smart card, or if its smart card is not programmed with an authorized identity code, authorization block 906 will not authenticate palmtop 100 and accordingly will disable synchronization, preventing data transfer.
- authentication block 906 authenticates the identity of palmtop 100 and acts to cause key mechanism 703 to enable synchronization, thus allowing data transfer. In one embodiment, authentication block 906 also then acts to enable decryption block 907 , to decipher encrypted data transmitted by palmtop 100 to exemplary desktop 103 . If authentication block 906 disables synchronization to an unauthorized identity, it will also disable decryption by not enabling decryption block 907 .
- FIG. 12 depicts an exemplary process 200 by which data transfer is enabled or disabled between a portable computer and another computer or data storage or communication system in one implementation of the present invention.
- a portable computer such as a palmtop device
- a compatible interface device such as a palmtop computer cradle
- step 202 occurs, wherein the identification tag or key within the palmtop computer, such as a magnetic key, emits a signal bearing encoded identification information.
- An identification authentication reader mechanism within the cradle senses this emission, step 203 .
- step 204 the authentication of the palmtop identity by the cradle, wherein an authentication capability of the identification reader mechanism is activated.
- the authentication capable reader mechanism executes step 205 , reading the palmtop identity information. It then determines if this palmtop identity being read is one that is authorized for synchronization through the cradle, step 206 . It acts accordingly to authorize or lockout synchronization in step 207 by triggering other mechanisms within the cradle, such as the key block 107 of FIG. 10 , for example.
- step 208 synchronization is either enabled or disabled. If it is disabled, step 209 , any decryption mechanism is also disabled in step 213 , and data transfer is prevented in step 214 .
- step 210 If synchronization is enabled, the palmtop computer synchronizes with the desktop computer via the cradle, step 210 , and decryption is also enabled, step 215 .
- step 211 data transfer is permitted, with decryption, if necessary. It should be appreciated that analogous alternatives to some of these steps are possible in various embodiments of the present invention. For example, steps may be added to allow operational steps involving contact free transmission of identification authentication information.
- these security measures prevent unauthorized data transfer between portable computers and other computers and data storage and communications systems.
- they are effective ways of promoting security of data on both portable computers and computers to which they may be synchronized.
- these security measures are automatically implemented in the otherwise necessary process of docking a portable computer with an interface to synchronize it with another computer to which the interface is attached, and thus they are convenient and user friendly.
- the present invention provides a convenient, user friendly method and system that can effectively disable unauthorized transfer of data from or to a portable computer, preventing unauthorized extraction of data from portable computers by downloading to other computers and data storage and communications systems, preventing the use of portable computers to download unauthorized data from such computers and systems, and deterring theft of portable computers for the data they may contain.
- a method and system for protecting data contained within portable computers from transfer to unauthorized computers or using portable computers to download unauthorized data from such computers can be applied to any computer having the capability to transfer data, but in one embodiment a portable computer is described herein.
- Authorization is enabled by an interface permitting synchronization of the portable computer with another computer by authentication of the particular portable computer identity. For instance, in one embodiment, when a portable computer is docked with a compatible interface connected to a desktop computer, it is identified by the interface through contacts or contact free sensing. If the particular portable computer identity is authenticated as one authorized to communicate with that desktop, then synchronization of the portable computer with the desktop for communication will be enabled by the interface. The portable computer may then communicate with the desktop and transfer data.
- the portable computer identity is not one which is authorized for communication with the desktop, then authentication will not occur, synchronization will correspondingly be disabled by the interface, and communication between the portable computer and the desktop will be prevented.
- Various systems can be used to enable the identity authentication.
- a contact free magnetic key is used.
- the identifying system also encrypts all data transferred to a key value specific to the unique identity, such that unauthorized external applications are forbidden from access to the data.
- a method and system for preventing unauthorized transfer of data between a portable computer system and systems of data storage and communication including other computers wherein identification authentication information is received for portable computer system devices which express a unique identity for that portable computer system device, the identification authentication information is compared with a list of authorized portable computer system device identities, determination is made as to whether the portable computer system device identity is authorized based on the identification authentication information received about the unique identity, and synchronization enabling or disabling communication between the portable computer system and the systems of data storage and communication including other computers is authorized or prohibited accordingly.
- encryption of data transferred from the portable computer system is made to a specific key value corresponding to the unique identity.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/726,822 US7346778B1 (en) | 2000-11-29 | 2000-11-29 | Security method and apparatus for controlling the data exchange on handheld computers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/726,822 US7346778B1 (en) | 2000-11-29 | 2000-11-29 | Security method and apparatus for controlling the data exchange on handheld computers |
Publications (1)
Publication Number | Publication Date |
---|---|
US7346778B1 true US7346778B1 (en) | 2008-03-18 |
Family
ID=39182343
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/726,822 Expired - Fee Related US7346778B1 (en) | 2000-11-29 | 2000-11-29 | Security method and apparatus for controlling the data exchange on handheld computers |
Country Status (1)
Country | Link |
---|---|
US (1) | US7346778B1 (en) |
Cited By (108)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060041746A1 (en) * | 2004-08-17 | 2006-02-23 | Research In Motion Limited | Method, system and device for authenticating a user |
US20080089658A1 (en) * | 2006-10-13 | 2008-04-17 | Jeff Grady | Interface systems for portable digital media storage and playback devices |
US20080211780A1 (en) * | 2002-06-18 | 2008-09-04 | Jory Bell | Component for use as a portable computing device and pointing device in a modular computing system |
US20090077644A1 (en) * | 2004-09-22 | 2009-03-19 | Research In Motion Limited | Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices |
US20090083850A1 (en) * | 2007-09-24 | 2009-03-26 | Apple Inc. | Embedded authentication systems in an electronic device |
US20090232300A1 (en) * | 2008-03-14 | 2009-09-17 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
JP2009245139A (en) * | 2008-03-31 | 2009-10-22 | Brother Ind Ltd | Tamper prevention system, portable terminal device with tamper prevention function, attaching device with tamper prevention function, tamper prevention method, and temper prevention program |
US20100325434A1 (en) * | 2003-01-13 | 2010-12-23 | Sony Corporation | Real-time delivery of license for previously stored encrypted content |
US20110140961A1 (en) * | 2009-12-14 | 2011-06-16 | Chen-Chen Yeh | Mobile phone cradle with GPS and Bluetooth functionality |
US20120161924A1 (en) * | 2010-12-22 | 2012-06-28 | Rfmarq, Inc. | Automatic Authentication of Electronic Devices |
FR2977336A1 (en) * | 2011-06-28 | 2013-01-04 | Guillaume Paci | Computing device i.e. tablet computer, has touch screen for displaying user session while session is on separate fixed computer, where synchronization of data between tablet computer and fixed computer is carried out by software |
US8353053B1 (en) * | 2008-04-14 | 2013-01-08 | Mcafee, Inc. | Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption |
US20130268999A1 (en) * | 2012-04-05 | 2013-10-10 | Andy Kiang | Device pinning capability for enterprise cloud service and storage accounts |
US8560722B2 (en) | 2011-03-18 | 2013-10-15 | International Business Machines Corporation | System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values |
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
US8621008B2 (en) | 2007-04-26 | 2013-12-31 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8713468B2 (en) | 2008-08-06 | 2014-04-29 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US8719445B2 (en) | 2012-07-03 | 2014-05-06 | Box, Inc. | System and method for load balancing multiple file transfer protocol (FTP) servers to service FTP connections for a cloud-based service |
US8745267B2 (en) | 2012-08-19 | 2014-06-03 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
US8868574B2 (en) | 2012-07-30 | 2014-10-21 | Box, Inc. | System and method for advanced search and filtering mechanisms for enterprise administrators in a cloud-based environment |
US8892679B1 (en) | 2013-09-13 | 2014-11-18 | Box, Inc. | Mobile device, methods and user interfaces thereof in a mobile device platform featuring multifunctional access and engagement in a collaborative environment provided by a cloud-based platform |
US8914900B2 (en) | 2012-05-23 | 2014-12-16 | Box, Inc. | Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform |
US8990151B2 (en) | 2011-10-14 | 2015-03-24 | Box, Inc. | Automatic and semi-automatic tagging features of work items in a shared workspace for metadata tracking in a cloud-based content management system with selective or optional user contribution |
US8990307B2 (en) | 2011-11-16 | 2015-03-24 | Box, Inc. | Resource effective incremental updating of a remote client with events which occurred via a cloud-enabled platform |
US9015601B2 (en) | 2011-06-21 | 2015-04-21 | Box, Inc. | Batch uploading of content to a web-based collaboration environment |
US9019123B2 (en) | 2011-12-22 | 2015-04-28 | Box, Inc. | Health check services for web-based collaboration environments |
US9027108B2 (en) | 2012-05-23 | 2015-05-05 | Box, Inc. | Systems and methods for secure file portability between mobile applications on a mobile device |
US9063912B2 (en) | 2011-06-22 | 2015-06-23 | Box, Inc. | Multimedia content preview rendering in a cloud content management system |
US9098474B2 (en) | 2011-10-26 | 2015-08-04 | Box, Inc. | Preview pre-generation based on heuristics and algorithmic prediction/assessment of predicted user behavior for enhancement of user experience |
US9117087B2 (en) | 2012-09-06 | 2015-08-25 | Box, Inc. | System and method for creating a secure channel for inter-application communication based on intents |
US9135462B2 (en) | 2012-08-29 | 2015-09-15 | Box, Inc. | Upload and download streaming encryption to/from a cloud-based platform |
US9195519B2 (en) | 2012-09-06 | 2015-11-24 | Box, Inc. | Disabling the self-referential appearance of a mobile application in an intent via a background registration |
US9195636B2 (en) | 2012-03-07 | 2015-11-24 | Box, Inc. | Universal file type preview for mobile devices |
US9197718B2 (en) | 2011-09-23 | 2015-11-24 | Box, Inc. | Central management and control of user-contributed content in a web-based collaboration environment and management console thereof |
US9213684B2 (en) | 2013-09-13 | 2015-12-15 | Box, Inc. | System and method for rendering document in web browser or mobile device regardless of third-party plug-in software |
US9215197B2 (en) | 2007-08-17 | 2015-12-15 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US9237170B2 (en) | 2012-07-19 | 2016-01-12 | Box, Inc. | Data loss prevention (DLP) methods and architectures by a cloud service |
US9292833B2 (en) | 2012-09-14 | 2016-03-22 | Box, Inc. | Batching notifications of activities that occur in a web-based collaboration environment |
US20160087675A1 (en) * | 2014-09-20 | 2016-03-24 | Innovasic, Inc. | Ethernet interface module |
US9311071B2 (en) | 2012-09-06 | 2016-04-12 | Box, Inc. | Force upgrade of a mobile application via a server side configuration file |
US9342674B2 (en) | 2003-05-30 | 2016-05-17 | Apple Inc. | Man-machine interface for controlling access to electronic devices |
CN105608362A (en) * | 2016-03-15 | 2016-05-25 | 苏明儒 | Internet identity authentication trusted system and terminal and authentication method |
US9369520B2 (en) | 2012-08-19 | 2016-06-14 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
US9396216B2 (en) | 2012-05-04 | 2016-07-19 | Box, Inc. | Repository redundancy implementation of a system which incrementally updates clients with events that occurred via a cloud-enabled platform |
US9396245B2 (en) | 2013-01-02 | 2016-07-19 | Box, Inc. | Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9413587B2 (en) | 2012-05-02 | 2016-08-09 | Box, Inc. | System and method for a third-party application to access content within a cloud-based platform |
US9483473B2 (en) | 2013-09-13 | 2016-11-01 | Box, Inc. | High availability architecture for a cloud-based concurrent-access collaboration platform |
US9495364B2 (en) | 2012-10-04 | 2016-11-15 | Box, Inc. | Enhanced quick search features, low-barrier commenting/interactive features in a collaboration platform |
US9507795B2 (en) | 2013-01-11 | 2016-11-29 | Box, Inc. | Functionalities, features, and user interface of a synchronization client to a cloud-based environment |
US9519886B2 (en) | 2013-09-13 | 2016-12-13 | Box, Inc. | Simultaneous editing/accessing of content by collaborator invitation through a web-based or mobile application to a cloud-based collaboration platform |
US9519526B2 (en) | 2007-12-05 | 2016-12-13 | Box, Inc. | File management system and collaboration service and integration capabilities with third party applications |
US9535924B2 (en) | 2013-07-30 | 2017-01-03 | Box, Inc. | Scalability improvement in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9535909B2 (en) | 2013-09-13 | 2017-01-03 | Box, Inc. | Configurable event-based automation architecture for cloud-based collaboration platforms |
US9553758B2 (en) | 2012-09-18 | 2017-01-24 | Box, Inc. | Sandboxing individual applications to specific user folders in a cloud-based service |
US9558202B2 (en) | 2012-08-27 | 2017-01-31 | Box, Inc. | Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment |
US9575981B2 (en) | 2012-04-11 | 2017-02-21 | Box, Inc. | Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system |
US9602514B2 (en) | 2014-06-16 | 2017-03-21 | Box, Inc. | Enterprise mobility management and verification of a managed application by a content provider |
US9628268B2 (en) | 2012-10-17 | 2017-04-18 | Box, Inc. | Remote key management in a cloud-based environment |
US9633037B2 (en) | 2013-06-13 | 2017-04-25 | Box, Inc | Systems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform |
US9652741B2 (en) | 2011-07-08 | 2017-05-16 | Box, Inc. | Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof |
US9665349B2 (en) | 2012-10-05 | 2017-05-30 | Box, Inc. | System and method for generating embeddable widgets which enable access to a cloud-based collaboration platform |
US9691051B2 (en) | 2012-05-21 | 2017-06-27 | Box, Inc. | Security enhancement through application access control |
US9705967B2 (en) | 2012-10-04 | 2017-07-11 | Box, Inc. | Corporate user discovery and identification of recommended collaborators in a cloud platform |
US9712510B2 (en) | 2012-07-06 | 2017-07-18 | Box, Inc. | Systems and methods for securely submitting comments among users via external messaging applications in a cloud-based platform |
US9756022B2 (en) | 2014-08-29 | 2017-09-05 | Box, Inc. | Enhanced remote key management for an enterprise in a cloud-based environment |
US9773051B2 (en) | 2011-11-29 | 2017-09-26 | Box, Inc. | Mobile platform file and folder selection functionalities for offline access and synchronization |
US9794256B2 (en) | 2012-07-30 | 2017-10-17 | Box, Inc. | System and method for advanced control tools for administrators in a cloud-based service |
US9792320B2 (en) | 2012-07-06 | 2017-10-17 | Box, Inc. | System and method for performing shard migration to support functions of a cloud-based service |
US9805050B2 (en) | 2013-06-21 | 2017-10-31 | Box, Inc. | Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US9894119B2 (en) | 2014-08-29 | 2018-02-13 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9904435B2 (en) | 2012-01-06 | 2018-02-27 | Box, Inc. | System and method for actionable event generation for task delegation and management via a discussion forum in a web-based collaboration environment |
US9953036B2 (en) | 2013-01-09 | 2018-04-24 | Box, Inc. | File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9959420B2 (en) | 2012-10-02 | 2018-05-01 | Box, Inc. | System and method for enhanced security and management mechanisms for enterprise administrators in a cloud-based environment |
US9965745B2 (en) | 2012-02-24 | 2018-05-08 | Box, Inc. | System and method for promoting enterprise adoption of a web-based collaboration environment |
US9978040B2 (en) | 2011-07-08 | 2018-05-22 | Box, Inc. | Collaboration sessions in a workspace on a cloud-based content management system |
US10038731B2 (en) | 2014-08-29 | 2018-07-31 | Box, Inc. | Managing flow-based interactions with cloud-based shared content |
US10110656B2 (en) | 2013-06-25 | 2018-10-23 | Box, Inc. | Systems and methods for providing shell communication in a cloud-based platform |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US10198587B2 (en) | 2007-09-05 | 2019-02-05 | Mcafee, Llc | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US10200256B2 (en) | 2012-09-17 | 2019-02-05 | Box, Inc. | System and method of a manipulative handle in an interactive mobile user interface |
US10229134B2 (en) | 2013-06-25 | 2019-03-12 | Box, Inc. | Systems and methods for managing upgrades, migration of user data and improving performance of a cloud-based platform |
US10235383B2 (en) | 2012-12-19 | 2019-03-19 | Box, Inc. | Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10452667B2 (en) | 2012-07-06 | 2019-10-22 | Box Inc. | Identification of people as search results from key-word based searches of content in a cloud-based environment |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10509527B2 (en) | 2013-09-13 | 2019-12-17 | Box, Inc. | Systems and methods for configuring event-based automation in cloud-based collaboration platforms |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10530854B2 (en) | 2014-05-30 | 2020-01-07 | Box, Inc. | Synchronization of permissioned content in cloud-based environments |
US10554426B2 (en) | 2011-01-20 | 2020-02-04 | Box, Inc. | Real time notification of activities that occur in a web-based collaboration environment |
US10574442B2 (en) | 2014-08-29 | 2020-02-25 | Box, Inc. | Enhanced remote key management for an enterprise in a cloud-based environment |
US10599671B2 (en) | 2013-01-17 | 2020-03-24 | Box, Inc. | Conflict resolution, retry condition management, and handling of problem files for the synchronization client to a cloud-based platform |
US10725968B2 (en) | 2013-05-10 | 2020-07-28 | Box, Inc. | Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform |
US10846074B2 (en) | 2013-05-10 | 2020-11-24 | Box, Inc. | Identification and handling of items to be ignored for synchronization with a cloud-based platform by a synchronization client |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US10866931B2 (en) | 2013-10-22 | 2020-12-15 | Box, Inc. | Desktop application for accessing a cloud collaboration platform |
US10915492B2 (en) | 2012-09-19 | 2021-02-09 | Box, Inc. | Cloud-based platform enabled with media content indexed for text-based searches and/or metadata extraction |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11210610B2 (en) | 2011-10-26 | 2021-12-28 | Box, Inc. | Enhanced multimedia content preview rendering in a cloud content management system |
US11209961B2 (en) | 2012-05-18 | 2021-12-28 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US20220019651A1 (en) * | 2020-07-17 | 2022-01-20 | Jpmorgan Chase Bank, N.A. | Method and apparatus for automating process of receiving verification documentation |
US11232481B2 (en) | 2012-01-30 | 2022-01-25 | Box, Inc. | Extended applications of multimedia content previews in the cloud-based content management system |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
US12099586B2 (en) | 2022-01-28 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
US5239166A (en) * | 1989-01-17 | 1993-08-24 | Graves Marcel A | Secure data interchange system erasing a card memory upon an invalid response |
US5600800A (en) * | 1992-06-29 | 1997-02-04 | Elonex I.P. Holdings, Ltd. | Personal computer system having a docking bay and a hand-held portable computer adapted to dock in the docking bay by a full-service parallel bus |
US5887063A (en) * | 1995-07-28 | 1999-03-23 | Hewlett-Packard Company | Communication system for portable appliances |
US6157825A (en) * | 1993-06-08 | 2000-12-05 | Corsair Communications, Inc. | Cellular telephone anti-fraud system |
US20010011308A1 (en) * | 1992-12-02 | 2001-08-02 | Ted H. Clark | Handheld computer synchronized with a host computer |
US6286099B1 (en) * | 1998-07-23 | 2001-09-04 | Hewlett-Packard Company | Determining point of interaction device security properties and ensuring secure transactions in an open networking environment |
US6418534B1 (en) * | 1998-05-08 | 2002-07-09 | Hewlett-Packard Company | Password protection for computer docking station |
US6480101B1 (en) * | 1996-04-01 | 2002-11-12 | Cubic Corporation | Contactless proximity automated data collection system and method |
US6549917B1 (en) * | 1999-04-29 | 2003-04-15 | Waveware Communications, Inc. | Synchronization of host computers and handheld remote computers |
-
2000
- 2000-11-29 US US09/726,822 patent/US7346778B1/en not_active Expired - Fee Related
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
US5239166A (en) * | 1989-01-17 | 1993-08-24 | Graves Marcel A | Secure data interchange system erasing a card memory upon an invalid response |
US5600800A (en) * | 1992-06-29 | 1997-02-04 | Elonex I.P. Holdings, Ltd. | Personal computer system having a docking bay and a hand-held portable computer adapted to dock in the docking bay by a full-service parallel bus |
US20010011308A1 (en) * | 1992-12-02 | 2001-08-02 | Ted H. Clark | Handheld computer synchronized with a host computer |
US6157825A (en) * | 1993-06-08 | 2000-12-05 | Corsair Communications, Inc. | Cellular telephone anti-fraud system |
US5887063A (en) * | 1995-07-28 | 1999-03-23 | Hewlett-Packard Company | Communication system for portable appliances |
US6480101B1 (en) * | 1996-04-01 | 2002-11-12 | Cubic Corporation | Contactless proximity automated data collection system and method |
US6418534B1 (en) * | 1998-05-08 | 2002-07-09 | Hewlett-Packard Company | Password protection for computer docking station |
US6286099B1 (en) * | 1998-07-23 | 2001-09-04 | Hewlett-Packard Company | Determining point of interaction device security properties and ensuring secure transactions in an open networking environment |
US6549917B1 (en) * | 1999-04-29 | 2003-04-15 | Waveware Communications, Inc. | Synchronization of host computers and handheld remote computers |
Cited By (194)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080211780A1 (en) * | 2002-06-18 | 2008-09-04 | Jory Bell | Component for use as a portable computing device and pointing device in a modular computing system |
US20100325434A1 (en) * | 2003-01-13 | 2010-12-23 | Sony Corporation | Real-time delivery of license for previously stored encrypted content |
US9342674B2 (en) | 2003-05-30 | 2016-05-17 | Apple Inc. | Man-machine interface for controlling access to electronic devices |
US20060041746A1 (en) * | 2004-08-17 | 2006-02-23 | Research In Motion Limited | Method, system and device for authenticating a user |
US7562218B2 (en) * | 2004-08-17 | 2009-07-14 | Research In Motion Limited | Method, system and device for authenticating a user |
US20090282247A1 (en) * | 2004-08-17 | 2009-11-12 | Research In Motion Limited | Method, system and device for authenticating a user |
US20090077644A1 (en) * | 2004-09-22 | 2009-03-19 | Research In Motion Limited | Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices |
US8533329B2 (en) | 2004-09-22 | 2013-09-10 | Blackberry Limited | Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices |
US20110167484A1 (en) * | 2004-09-22 | 2011-07-07 | Research In Motion Limited | Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices |
US7921209B2 (en) | 2004-09-22 | 2011-04-05 | Research In Motion Limited | Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices |
US20080089658A1 (en) * | 2006-10-13 | 2008-04-17 | Jeff Grady | Interface systems for portable digital media storage and playback devices |
US9918039B2 (en) * | 2006-10-13 | 2018-03-13 | Koninklijke Philips N.V. | Interface systems for portable digital media storage and playback devices |
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
US8943158B2 (en) | 2007-04-26 | 2015-01-27 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8621008B2 (en) | 2007-04-26 | 2013-12-31 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US9215197B2 (en) | 2007-08-17 | 2015-12-15 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US10489606B2 (en) | 2007-08-17 | 2019-11-26 | Mcafee, Llc | System, method, and computer program product for preventing image-related data loss |
US10198587B2 (en) | 2007-09-05 | 2019-02-05 | Mcafee, Llc | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US11645404B2 (en) | 2007-09-05 | 2023-05-09 | Mcafee, Llc | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US9274647B2 (en) | 2007-09-24 | 2016-03-01 | Apple Inc. | Embedded authentication systems in an electronic device |
US9250795B2 (en) | 2007-09-24 | 2016-02-02 | Apple Inc. | Embedded authentication systems in an electronic device |
US9953152B2 (en) | 2007-09-24 | 2018-04-24 | Apple Inc. | Embedded authentication systems in an electronic device |
US9128601B2 (en) | 2007-09-24 | 2015-09-08 | Apple Inc. | Embedded authentication systems in an electronic device |
US9519771B2 (en) | 2007-09-24 | 2016-12-13 | Apple Inc. | Embedded authentication systems in an electronic device |
US10275585B2 (en) | 2007-09-24 | 2019-04-30 | Apple Inc. | Embedded authentication systems in an electronic device |
US9495531B2 (en) | 2007-09-24 | 2016-11-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US9134896B2 (en) | 2007-09-24 | 2015-09-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US9038167B2 (en) | 2007-09-24 | 2015-05-19 | Apple Inc. | Embedded authentication systems in an electronic device |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US8943580B2 (en) * | 2007-09-24 | 2015-01-27 | Apple Inc. | Embedded authentication systems in an electronic device |
US11468155B2 (en) | 2007-09-24 | 2022-10-11 | Apple Inc. | Embedded authentication systems in an electronic device |
US20090083850A1 (en) * | 2007-09-24 | 2009-03-26 | Apple Inc. | Embedded authentication systems in an electronic device |
US9329771B2 (en) | 2007-09-24 | 2016-05-03 | Apple Inc | Embedded authentication systems in an electronic device |
US9304624B2 (en) | 2007-09-24 | 2016-04-05 | Apple Inc. | Embedded authentication systems in an electronic device |
US9519526B2 (en) | 2007-12-05 | 2016-12-13 | Box, Inc. | File management system and collaboration service and integration capabilities with third party applications |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US20090232300A1 (en) * | 2008-03-14 | 2009-09-17 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US8893285B2 (en) | 2008-03-14 | 2014-11-18 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US9843564B2 (en) | 2008-03-14 | 2017-12-12 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
JP4557033B2 (en) * | 2008-03-31 | 2010-10-06 | ブラザー工業株式会社 | Unauthorized operation prevention system, portable terminal device with unauthorized operation prevention function, mounting device with unauthorized operation prevention function, unauthorized operation prevention method, and unauthorized operation prevention program |
JP2009245139A (en) * | 2008-03-31 | 2009-10-22 | Brother Ind Ltd | Tamper prevention system, portable terminal device with tamper prevention function, attaching device with tamper prevention function, tamper prevention method, and temper prevention program |
US8353053B1 (en) * | 2008-04-14 | 2013-01-08 | Mcafee, Inc. | Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption |
US8713468B2 (en) | 2008-08-06 | 2014-04-29 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US9077684B1 (en) | 2008-08-06 | 2015-07-07 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US9531656B2 (en) | 2008-08-06 | 2016-12-27 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US20110140961A1 (en) * | 2009-12-14 | 2011-06-16 | Chen-Chen Yeh | Mobile phone cradle with GPS and Bluetooth functionality |
US20120161924A1 (en) * | 2010-12-22 | 2012-06-28 | Rfmarq, Inc. | Automatic Authentication of Electronic Devices |
US10554426B2 (en) | 2011-01-20 | 2020-02-04 | Box, Inc. | Real time notification of activities that occur in a web-based collaboration environment |
US8560722B2 (en) | 2011-03-18 | 2013-10-15 | International Business Machines Corporation | System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values |
US9015601B2 (en) | 2011-06-21 | 2015-04-21 | Box, Inc. | Batch uploading of content to a web-based collaboration environment |
US9063912B2 (en) | 2011-06-22 | 2015-06-23 | Box, Inc. | Multimedia content preview rendering in a cloud content management system |
FR2977336A1 (en) * | 2011-06-28 | 2013-01-04 | Guillaume Paci | Computing device i.e. tablet computer, has touch screen for displaying user session while session is on separate fixed computer, where synchronization of data between tablet computer and fixed computer is carried out by software |
US9652741B2 (en) | 2011-07-08 | 2017-05-16 | Box, Inc. | Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof |
US9978040B2 (en) | 2011-07-08 | 2018-05-22 | Box, Inc. | Collaboration sessions in a workspace on a cloud-based content management system |
US9197718B2 (en) | 2011-09-23 | 2015-11-24 | Box, Inc. | Central management and control of user-contributed content in a web-based collaboration environment and management console thereof |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US10516997B2 (en) | 2011-09-29 | 2019-12-24 | Apple Inc. | Authentication with secondary approver |
US8990151B2 (en) | 2011-10-14 | 2015-03-24 | Box, Inc. | Automatic and semi-automatic tagging features of work items in a shared workspace for metadata tracking in a cloud-based content management system with selective or optional user contribution |
US9098474B2 (en) | 2011-10-26 | 2015-08-04 | Box, Inc. | Preview pre-generation based on heuristics and algorithmic prediction/assessment of predicted user behavior for enhancement of user experience |
US11210610B2 (en) | 2011-10-26 | 2021-12-28 | Box, Inc. | Enhanced multimedia content preview rendering in a cloud content management system |
US9015248B2 (en) | 2011-11-16 | 2015-04-21 | Box, Inc. | Managing updates at clients used by a user to access a cloud-based collaboration service |
US8990307B2 (en) | 2011-11-16 | 2015-03-24 | Box, Inc. | Resource effective incremental updating of a remote client with events which occurred via a cloud-enabled platform |
US11537630B2 (en) | 2011-11-29 | 2022-12-27 | Box, Inc. | Mobile platform file and folder selection functionalities for offline access and synchronization |
US10909141B2 (en) | 2011-11-29 | 2021-02-02 | Box, Inc. | Mobile platform file and folder selection functionalities for offline access and synchronization |
US11853320B2 (en) | 2011-11-29 | 2023-12-26 | Box, Inc. | Mobile platform file and folder selection functionalities for offline access and synchronization |
US9773051B2 (en) | 2011-11-29 | 2017-09-26 | Box, Inc. | Mobile platform file and folder selection functionalities for offline access and synchronization |
US9019123B2 (en) | 2011-12-22 | 2015-04-28 | Box, Inc. | Health check services for web-based collaboration environments |
US9904435B2 (en) | 2012-01-06 | 2018-02-27 | Box, Inc. | System and method for actionable event generation for task delegation and management via a discussion forum in a web-based collaboration environment |
US11232481B2 (en) | 2012-01-30 | 2022-01-25 | Box, Inc. | Extended applications of multimedia content previews in the cloud-based content management system |
US10713624B2 (en) | 2012-02-24 | 2020-07-14 | Box, Inc. | System and method for promoting enterprise adoption of a web-based collaboration environment |
US9965745B2 (en) | 2012-02-24 | 2018-05-08 | Box, Inc. | System and method for promoting enterprise adoption of a web-based collaboration environment |
US9195636B2 (en) | 2012-03-07 | 2015-11-24 | Box, Inc. | Universal file type preview for mobile devices |
US20130268999A1 (en) * | 2012-04-05 | 2013-10-10 | Andy Kiang | Device pinning capability for enterprise cloud service and storage accounts |
US9054919B2 (en) * | 2012-04-05 | 2015-06-09 | Box, Inc. | Device pinning capability for enterprise cloud service and storage accounts |
US9575981B2 (en) | 2012-04-11 | 2017-02-21 | Box, Inc. | Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system |
US9413587B2 (en) | 2012-05-02 | 2016-08-09 | Box, Inc. | System and method for a third-party application to access content within a cloud-based platform |
US9396216B2 (en) | 2012-05-04 | 2016-07-19 | Box, Inc. | Repository redundancy implementation of a system which incrementally updates clients with events that occurred via a cloud-enabled platform |
US11209961B2 (en) | 2012-05-18 | 2021-12-28 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11989394B2 (en) | 2012-05-18 | 2024-05-21 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9691051B2 (en) | 2012-05-21 | 2017-06-27 | Box, Inc. | Security enhancement through application access control |
US9027108B2 (en) | 2012-05-23 | 2015-05-05 | Box, Inc. | Systems and methods for secure file portability between mobile applications on a mobile device |
US8914900B2 (en) | 2012-05-23 | 2014-12-16 | Box, Inc. | Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform |
US9552444B2 (en) | 2012-05-23 | 2017-01-24 | Box, Inc. | Identification verification mechanisms for a third-party application to access content in a cloud-based platform |
US9280613B2 (en) | 2012-05-23 | 2016-03-08 | Box, Inc. | Metadata enabled third-party application access of content at a cloud-based platform via a native client to the cloud-based platform |
US9021099B2 (en) | 2012-07-03 | 2015-04-28 | Box, Inc. | Load balancing secure FTP connections among multiple FTP servers |
US8719445B2 (en) | 2012-07-03 | 2014-05-06 | Box, Inc. | System and method for load balancing multiple file transfer protocol (FTP) servers to service FTP connections for a cloud-based service |
US9792320B2 (en) | 2012-07-06 | 2017-10-17 | Box, Inc. | System and method for performing shard migration to support functions of a cloud-based service |
US9712510B2 (en) | 2012-07-06 | 2017-07-18 | Box, Inc. | Systems and methods for securely submitting comments among users via external messaging applications in a cloud-based platform |
US10452667B2 (en) | 2012-07-06 | 2019-10-22 | Box Inc. | Identification of people as search results from key-word based searches of content in a cloud-based environment |
US9237170B2 (en) | 2012-07-19 | 2016-01-12 | Box, Inc. | Data loss prevention (DLP) methods and architectures by a cloud service |
US9794256B2 (en) | 2012-07-30 | 2017-10-17 | Box, Inc. | System and method for advanced control tools for administrators in a cloud-based service |
US8868574B2 (en) | 2012-07-30 | 2014-10-21 | Box, Inc. | System and method for advanced search and filtering mechanisms for enterprise administrators in a cloud-based environment |
US9369520B2 (en) | 2012-08-19 | 2016-06-14 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
US8745267B2 (en) | 2012-08-19 | 2014-06-03 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
US9729675B2 (en) | 2012-08-19 | 2017-08-08 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
US9558202B2 (en) | 2012-08-27 | 2017-01-31 | Box, Inc. | Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment |
US9135462B2 (en) | 2012-08-29 | 2015-09-15 | Box, Inc. | Upload and download streaming encryption to/from a cloud-based platform |
US9450926B2 (en) | 2012-08-29 | 2016-09-20 | Box, Inc. | Upload and download streaming encryption to/from a cloud-based platform |
US9195519B2 (en) | 2012-09-06 | 2015-11-24 | Box, Inc. | Disabling the self-referential appearance of a mobile application in an intent via a background registration |
US9117087B2 (en) | 2012-09-06 | 2015-08-25 | Box, Inc. | System and method for creating a secure channel for inter-application communication based on intents |
US9311071B2 (en) | 2012-09-06 | 2016-04-12 | Box, Inc. | Force upgrade of a mobile application via a server side configuration file |
US9292833B2 (en) | 2012-09-14 | 2016-03-22 | Box, Inc. | Batching notifications of activities that occur in a web-based collaboration environment |
US10200256B2 (en) | 2012-09-17 | 2019-02-05 | Box, Inc. | System and method of a manipulative handle in an interactive mobile user interface |
US9553758B2 (en) | 2012-09-18 | 2017-01-24 | Box, Inc. | Sandboxing individual applications to specific user folders in a cloud-based service |
US10915492B2 (en) | 2012-09-19 | 2021-02-09 | Box, Inc. | Cloud-based platform enabled with media content indexed for text-based searches and/or metadata extraction |
US9959420B2 (en) | 2012-10-02 | 2018-05-01 | Box, Inc. | System and method for enhanced security and management mechanisms for enterprise administrators in a cloud-based environment |
US9495364B2 (en) | 2012-10-04 | 2016-11-15 | Box, Inc. | Enhanced quick search features, low-barrier commenting/interactive features in a collaboration platform |
US9705967B2 (en) | 2012-10-04 | 2017-07-11 | Box, Inc. | Corporate user discovery and identification of recommended collaborators in a cloud platform |
US9665349B2 (en) | 2012-10-05 | 2017-05-30 | Box, Inc. | System and method for generating embeddable widgets which enable access to a cloud-based collaboration platform |
US9628268B2 (en) | 2012-10-17 | 2017-04-18 | Box, Inc. | Remote key management in a cloud-based environment |
US10235383B2 (en) | 2012-12-19 | 2019-03-19 | Box, Inc. | Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment |
US9396245B2 (en) | 2013-01-02 | 2016-07-19 | Box, Inc. | Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9953036B2 (en) | 2013-01-09 | 2018-04-24 | Box, Inc. | File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9507795B2 (en) | 2013-01-11 | 2016-11-29 | Box, Inc. | Functionalities, features, and user interface of a synchronization client to a cloud-based environment |
US10599671B2 (en) | 2013-01-17 | 2020-03-24 | Box, Inc. | Conflict resolution, retry condition management, and handling of problem files for the synchronization client to a cloud-based platform |
US10846074B2 (en) | 2013-05-10 | 2020-11-24 | Box, Inc. | Identification and handling of items to be ignored for synchronization with a cloud-based platform by a synchronization client |
US10725968B2 (en) | 2013-05-10 | 2020-07-28 | Box, Inc. | Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform |
US10877937B2 (en) | 2013-06-13 | 2020-12-29 | Box, Inc. | Systems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform |
US9633037B2 (en) | 2013-06-13 | 2017-04-25 | Box, Inc | Systems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform |
US11531648B2 (en) | 2013-06-21 | 2022-12-20 | Box, Inc. | Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform |
US9805050B2 (en) | 2013-06-21 | 2017-10-31 | Box, Inc. | Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform |
US10229134B2 (en) | 2013-06-25 | 2019-03-12 | Box, Inc. | Systems and methods for managing upgrades, migration of user data and improving performance of a cloud-based platform |
US10110656B2 (en) | 2013-06-25 | 2018-10-23 | Box, Inc. | Systems and methods for providing shell communication in a cloud-based platform |
US9535924B2 (en) | 2013-07-30 | 2017-01-03 | Box, Inc. | Scalability improvement in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US11494046B2 (en) | 2013-09-09 | 2022-11-08 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10055634B2 (en) | 2013-09-09 | 2018-08-21 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10410035B2 (en) | 2013-09-09 | 2019-09-10 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11287942B2 (en) | 2013-09-09 | 2022-03-29 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces |
US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10262182B2 (en) | 2013-09-09 | 2019-04-16 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10372963B2 (en) | 2013-09-09 | 2019-08-06 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9519886B2 (en) | 2013-09-13 | 2016-12-13 | Box, Inc. | Simultaneous editing/accessing of content by collaborator invitation through a web-based or mobile application to a cloud-based collaboration platform |
US10509527B2 (en) | 2013-09-13 | 2019-12-17 | Box, Inc. | Systems and methods for configuring event-based automation in cloud-based collaboration platforms |
US10044773B2 (en) | 2013-09-13 | 2018-08-07 | Box, Inc. | System and method of a multi-functional managing user interface for accessing a cloud-based platform via mobile devices |
US9213684B2 (en) | 2013-09-13 | 2015-12-15 | Box, Inc. | System and method for rendering document in web browser or mobile device regardless of third-party plug-in software |
US9704137B2 (en) | 2013-09-13 | 2017-07-11 | Box, Inc. | Simultaneous editing/accessing of content by collaborator invitation through a web-based or mobile application to a cloud-based collaboration platform |
US11435865B2 (en) | 2013-09-13 | 2022-09-06 | Box, Inc. | System and methods for configuring event-based automation in cloud-based collaboration platforms |
US9535909B2 (en) | 2013-09-13 | 2017-01-03 | Box, Inc. | Configurable event-based automation architecture for cloud-based collaboration platforms |
US11822759B2 (en) | 2013-09-13 | 2023-11-21 | Box, Inc. | System and methods for configuring event-based automation in cloud-based collaboration platforms |
US8892679B1 (en) | 2013-09-13 | 2014-11-18 | Box, Inc. | Mobile device, methods and user interfaces thereof in a mobile device platform featuring multifunctional access and engagement in a collaborative environment provided by a cloud-based platform |
US9483473B2 (en) | 2013-09-13 | 2016-11-01 | Box, Inc. | High availability architecture for a cloud-based concurrent-access collaboration platform |
US10866931B2 (en) | 2013-10-22 | 2020-12-15 | Box, Inc. | Desktop application for accessing a cloud collaboration platform |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10530854B2 (en) | 2014-05-30 | 2020-01-07 | Box, Inc. | Synchronization of permissioned content in cloud-based environments |
US9602514B2 (en) | 2014-06-16 | 2017-03-21 | Box, Inc. | Enterprise mobility management and verification of a managed application by a content provider |
US10574442B2 (en) | 2014-08-29 | 2020-02-25 | Box, Inc. | Enhanced remote key management for an enterprise in a cloud-based environment |
US11146600B2 (en) | 2014-08-29 | 2021-10-12 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
US9894119B2 (en) | 2014-08-29 | 2018-02-13 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
US10708323B2 (en) | 2014-08-29 | 2020-07-07 | Box, Inc. | Managing flow-based interactions with cloud-based shared content |
US10708321B2 (en) | 2014-08-29 | 2020-07-07 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
US10038731B2 (en) | 2014-08-29 | 2018-07-31 | Box, Inc. | Managing flow-based interactions with cloud-based shared content |
US9756022B2 (en) | 2014-08-29 | 2017-09-05 | Box, Inc. | Enhanced remote key management for an enterprise in a cloud-based environment |
US11876845B2 (en) | 2014-08-29 | 2024-01-16 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
CN107113198B (en) * | 2014-09-20 | 2021-01-19 | 英诺瓦西克股份有限公司 | Ethernet interface module |
US20160087675A1 (en) * | 2014-09-20 | 2016-03-24 | Innovasic, Inc. | Ethernet interface module |
CN107113198A (en) * | 2014-09-20 | 2017-08-29 | 英诺瓦西克股份有限公司 | Ethernet interface module |
US9497025B2 (en) * | 2014-09-20 | 2016-11-15 | Innovasic Inc. | Ethernet interface module |
CN105608362A (en) * | 2016-03-15 | 2016-05-25 | 苏明儒 | Internet identity authentication trusted system and terminal and authentication method |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10410076B2 (en) | 2017-09-09 | 2019-09-10 | Apple Inc. | Implementation of biometric authentication |
US10872256B2 (en) | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
US20230281291A1 (en) * | 2020-07-17 | 2023-09-07 | Jpmorgan Chase Bank, N.A. | Method and apparatus for automating process of receiving verification documentation |
US11687640B2 (en) * | 2020-07-17 | 2023-06-27 | Jpmorgan Chase Bank, N.A. | Method and apparatus for automating process of receiving verification documentation |
US12032673B2 (en) * | 2020-07-17 | 2024-07-09 | Jpmorgan Chase Bank, N.A. | Method and apparatus for automating process of receiving verification documentation |
US20220019651A1 (en) * | 2020-07-17 | 2022-01-20 | Jpmorgan Chase Bank, N.A. | Method and apparatus for automating process of receiving verification documentation |
US12099586B2 (en) | 2022-01-28 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
US12105874B2 (en) | 2023-02-02 | 2024-10-01 | Apple Inc. | Device control using gaze information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7346778B1 (en) | Security method and apparatus for controlling the data exchange on handheld computers | |
US7774613B2 (en) | Security technique for controlling access to a network by a wireless device | |
US7496765B2 (en) | System, method and program product to prevent unauthorized access to portable memory or storage device | |
EP0888677B1 (en) | An authentication method and system based on periodic challenge/response protocol | |
US20080098134A1 (en) | Portable Storage Device and Method For Exchanging Data | |
EP1980049B1 (en) | Wireless authentication | |
US6268788B1 (en) | Apparatus and method for providing an authentication system based on biometrics | |
US8572392B2 (en) | Access authentication method, information processing unit, and computer product | |
US6367017B1 (en) | Apparatus and method for providing and authentication system | |
US5889866A (en) | Method and apparatus for controlling access to detachably connectable computer devices using an encrypted password | |
US8543764B2 (en) | Storage device with accessible partitions | |
US20070283145A1 (en) | Multi-Factor Security System With Portable Devices And Security Kernels | |
EP1338940A1 (en) | Universal password generator | |
US20050221853A1 (en) | User authentication using a mobile phone SIM card | |
US20050221799A1 (en) | Smart terminal remote lock and format | |
US20040236954A1 (en) | Biometric-based authentication in a nonvolatile memory device | |
US20090222908A1 (en) | Device for Transmission of Stored Password Information Through a Standard Computer Input Interface | |
US20100011212A1 (en) | Radio frequency identification (rfid) based authentication methodology using standard and private frequency rfid tags | |
KR20140093556A (en) | Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof | |
US20140298024A1 (en) | Method for granting access to a network and device for implementing this method | |
KR100472105B1 (en) | Stand-alone type fingerprint recognition module and protection method of stand-alone type fingerprint recognition module | |
US20210337382A1 (en) | Information processing apparatus and non-transitory computer readable medium | |
KR20020004368A (en) | Operating method of computer system using electronic authentication system | |
EP2747468A1 (en) | Method for granting access to a network and device for implementing this method | |
CN110944082A (en) | Mobile phone capable of unlocking based on face recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PALM, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GUITER, OLIVIER;MARTEL, THIERRY;NICOLAS, REGIS;REEL/FRAME:011336/0001 Effective date: 20001128 |
|
AS | Assignment |
Owner name: PALM SOURCE, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALM, INC.;REEL/FRAME:013848/0120 Effective date: 20030212 |
|
AS | Assignment |
Owner name: PALMSOURCE, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALMONE, INC.;REEL/FRAME:014682/0572 Effective date: 20040405 Owner name: PALMSOURCE, INC.,CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALMONE, INC.;REEL/FRAME:014682/0572 Effective date: 20040405 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: ACCESS SYSTEMS AMERICAS, INC., CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:PALMSOURCE, INC.;REEL/FRAME:024892/0374 Effective date: 20061017 |
|
AS | Assignment |
Owner name: ACCESS CO., LTD., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ACCESS SYSTEMS AMERICAS, INC.;REEL/FRAME:025898/0852 Effective date: 20110225 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20160318 |